Search results for "Security"

showing 10 items of 1693 documents

Mobility and Spatio-Temporal Exposure Control

2013

Modern risk assessment methods cover many issues and encompass both risk analysis and corresponding prevention/mitigation measures.However, there is still room for improvement and one aspect that may benefit from more work is “exposure control”.The “exposure” an asset experiences plays an important part in the risks facing the asset.Amongst the aspects that all too regularly get exposed is user identities and user location information,and in a context with mobile subscriber and mobility in the service hosting (VM migration/mobility) the problems associated with lost identity/location privacy becomes urgent.In this paper we look at “exposure control” as a way for analyzing and protecting use…

Risk analysisService (systems architecture)Cover (telecommunications)Computer Networks and Communicationsbusiness.industryInternet privacyContext (language use)Cloud computingComputer securitycomputer.software_genreAsset (computer security)Hardware and ArchitectureRoamingbusinesscomputerVulnerability (computing)Journal of Cyber Security and Mobility
researchProduct

Risk Analysis of a Fuel Storage Terminal Using HAZOP and FTA

2017

[EN] The size and complexity of industrial chemical plants, together with the nature of the products handled, means that an analysis and control of the risks involved is required. This paper presents a methodology for risk analysis in chemical and allied industries that is based on a combination of HAZard and OPerability analysis (HAZOP) and a quantitative analysis of the most relevant risks through the development of fault trees, fault tree analysis (FTA). Results from FTA allow prioritizing the preventive and corrective measures to minimize the probability of failure. An analysis of a case study is performed; it consists in the terminal for unloading chemical and petroleum products, and t…

Riskbusiness.product_categoryOperabilityHazard and operability studyHealth Toxicology and Mutagenesis0211 other engineering and technologieslcsh:MedicineStorage02 engineering and technologyRisk AssessmentArticleDecision Support TechniquesPetroleum productAccident Prevention020401 chemical engineeringRisk analysis (business)Tank truckHumans0204 chemical engineeringPROYECTOS DE INGENIERIArisk; HAZard and OPerability analysis (HAZOP); Fault Tree Analysis (FTA); fuel; storageProbabilityFault tree analysis021110 strategic defence & security studiesbusiness.industrylcsh:RDecision TreesPublic Health Environmental and Occupational HealthFault Tree Analysis (FTA)FuelPort (computer networking)HazardPetroleumRisk analysis (engineering)SpainChemical IndustryEnvironmental sciencebusinessHAZard and OPerability analysis (HAZOP)
researchProduct

Pensar el riesgo. En diálogo con Luhmann

2010

RESUMEN La sociología del riesgo es una de las derivaciones más importantes de la teoría de sistemas de Luhmann. Riesgo no es una realidad sino un esquema de observación característico de nuestro tiempo. El concepto de riesgo es siempre parte de una dicotomía y Luhmann analiza dos posibilidades: riesgo-seguridad, riesgo-peligro. Esta última distinción es la que permite una gestión del riesgo capaz de asignar responsabilidades mediante el manejo de la noción de imputación. Hay una tendencia muy significativa a transformar peligros en riesgos. Los sistemas generan y trabajan con riesgos, que distribuyen y transforman. Aquí se analizan algunos de los riesgos del sistema jurídico. Los riesgos …

Risklcsh:Jurisprudence. Philosophy and theory of lawImputaciónK201-487DangerPeligroRiesgoRiesgo; Seguridad; Peligro; Imputación; Risk; Security; Danger; AttributionAttributionSecurityJurisprudence. Philosophy and theory of lawlcsh:K201-487SeguridadCuadernos Electrónicos de Filosofía del Derecho
researchProduct

The Law of Service Robots

2014

Il settore della robotica attiene alla progettazione e costruzione di un complesso variegato ed eterogeneo di macchine, quali robot, soldati e chirurghi, sistemi automatizzati di trasporto aereo, terrestre e marittimo, applicazioni industriali nell’ambito manifatturiero o nella agricoltura, robotica di servizio e altro ancora. Si tratta di un settore per eccellenza interdisciplinare la varietà di ambiti e applicazioni del quale fa sì che si discuta ancora sulla definizione di robot e su alcune sue proprietà: l’autonomia, l’adattatività o i gradi di interattività. Su queste basi, il problema, attualmente, non è tanto quello di determinare se e in che modo i robot ”agiscano”; la questione ver…

Robots drones remotely piloted aerial systems ENAC liability privacy data protection commons intellectual property digital forensics cyber-security criminal liabilitySettore IUS/01 - Diritto Privato
researchProduct

Security rights and insolvency law in the Roman legal system

2017

This chapter contains an analysis in depth of the Roman law system on security rights in rem (Spain, Italy, France).

Roman Legal SystemSecurity Rights in RemItalySpainPrivilegeFranceSettore IUS/04 - Diritto CommercialePledgeMortgage
researchProduct

A root cause analysis method for preventing erratic behavior in software development: PEBA

2019

Measures taken to prevent faults from being introduced or going undetected can secure development of highly reliable software systems. One such measure is analyzing root causes of recurring faults and preventing them from appearing again. Previous methods developed for this purpose have been reactive in nature and relied heavily on fault reporting mechanisms of ogranizations. Additionally, previous efforts lack a defined mechanism for innovating corrective actions. In this study, we strive to complement the existing methods by introducing a proactive and qualitative method that does not rely on fault data. During the course of the research, in addition to an extensive literature search, an …

Root (linguistics)Computer sciencefault removalohjelmistotekniikka0211 other engineering and technologiesfault preventionContext (language use)quality assurance02 engineering and technologyFault (power engineering)Industrial and Manufacturing EngineeringField (computer science)Software systemsoftware process improvementSafety Risk Reliability and Quality021110 strategic defence & security studies021103 operations researchbusiness.industrytietokoneohjelmatSoftware developmentProactivitysoftware reliabilityRisk analysis (engineering)root cause analysisohjelmistokehitysRoot cause analysisbusinessReliability Engineering & System Safety
researchProduct

Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall

2016

Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …

RouterComputer sciencenetwork vulnerabilitiesDenial-of-service attack02 engineering and technologyNetwork topologyComputer securitycomputer.software_genreFirewall (construction)Stateful firewall0202 electrical engineering electronic engineering information engineeringDenial of Servicecomplexity attackcomputational complexitybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsHash tablese-curitycomputer networksDoSbusinessSegmentation faultcomputerRebootComputer network
researchProduct

Early Warning Systems for Food Security in West Africa: Evolution, Achievements and Challenges

2010

In West Africa, early warning systems (EWSs) for food security have been widely recognized to have contributed, in the last 20 years, to an improved ability to deal with famine emergencies. Nevertheless, despite the advancements in understanding of the environmental and socio-economic dynamics and despite the improved technologies, tackling food security remains a difficult task for decision makers as demonstrated by local food crises in many countries of the region. African Monsoon Multidisciplinary Analysis, while improving the understanding of the monsoon system, allowed us to better orient research challenges to provide EWS with improved products, effectively meeting the needs of end-us…

S01 - Nutrition humaine - Considérations généralesAtmospheric Science010504 meteorology & atmospheric sciencesMeteorology[SDE.MCG]Environmental Sciences/Global ChangesEarly Warning Systems0207 environmental engineering02 engineering and technologyMonsoon01 natural sciencesWest africaTask (project management)[SDU.STU.CL] Sciences of the Universe [physics]/Earth Sciences/ClimatologyPolitical scienceWest AfricaSeasonal forecasts020701 environmental engineeringhttp://aims.fao.org/aos/agrovoc/c_8355Environmental planningComputingMilieux_MISCELLANEOUS0105 earth and related environmental sciencesE10 - Économie et politique agricoles2. Zero hungerFood securityWarning systemAgrometeorologyhttp://aims.fao.org/aos/agrovoc/c_10967Multidisciplinary analysisAgro-meteorologyFood securityEarly earning systems[ SDE.MCG ] Environmental Sciences/Global Changes[SDE.MCG] Environmental Sciences/Global Changessécurité alimentaireAgrometeorology13. Climate action[SDU.STU.CL]Sciences of the Universe [physics]/Earth Sciences/ClimatologyFamine[ SDU.STU.CL ] Sciences of the Universe [physics]/Earth Sciences/Climatology
researchProduct

Empirical Study on Cyber Range Capabilities, Interactions and Learning Features

2021

Emerging technologies and the globalization require constant investment in people and their performance in actual and virtual environments. New technologies such as autonomous systems, machine learning and artificial intelligence (AI) radically re-contextualize the human dimension of the organization. Technological developments are changing the ways people experience the physical and the virtual environments. Strategic changes have revealed new critical vulnerabilities such as social media-based disinformation campaigning with impact on the human aspects at state, societal, organizational and individual levels. Scenarios of gathering information, committing fraud or getting access to critic…

SDG 16 - PeaceKnowledge managementCybersecurityComputer scienceEmerging technologiesEmpirical researchAcquisition of skillsHuman PerformanceLearningResilience (network)Cognitive behaviourHuman Dimensionbusiness.industrySDG 16 - Peace Justice and Strong InstitutionsCyber-physical systemSDG 8 - Decent Work and Economic Growth/dk/atira/pure/sustainabledevelopmentgoals/quality_education/dk/atira/pure/sustainabledevelopmentgoals/peace_justice_and_strong_institutions/dk/atira/pure/sustainabledevelopmentgoals/decent_work_and_economic_growthJustice and Strong InstitutionsMixed realityCyber RangeVirtual learning environmentAugmented realitybusinessHuman factorsSDG 4 - Quality Education
researchProduct

Tietoturvan toteutus SD-WAN -operaattoripalveluissa

2017

Tutkielmassa selvitettiin vaihtoehtoja, joiden avulla palomuuraukseen liittyvä tekninen tietoturva voidaan toteuttaa uusissa SD-WAN -pohjaisissa verkottamisratkaisuissa ja niihin liittyvissä hybridiverkoissa operaattorin näkökulmasta. Palomuuraukseen liittyvää ratkaisua tulisi voida hyödyntää operaattorin asiakasverkoissa ja sen tulee skaalautua asiakkaiden käyttämien palveluiden mukaisesti. Tutkielmassa analysoitiin, kuinka SDN- ja NFV-teknologioita voidaan hyödyntää palomuurauksen toteutuksessa ja kannattaako palomuuraus toteuttaa SDN-pohjaisessa verkossa keskitetysti vai hajautetusti. Lisäksi pohdittiin, kuinka verkon hallinta voidaan toteuttaa keskitetysti, jotta jokaista verkon laitett…

SDNjärjestelmäarkkitehtuuriNFVOpenFlowSoftware Defined SecuritySD-WANverkonhallintapalomuurit (tietoturva)
researchProduct